205 research outputs found

    Modelling and Simulation of Cognitive Electronic Attack under the Condition of System of systems Combat

    Get PDF
    From the height of system-of-systems combat and operational perspective, the operations of cognitive electronic warfare (CEW) was analysed, and its main process and links were described. Secondly, the jamming effectiveness evaluation (JEE) model of cognitive electronic attack (CEA) operations was established based on the interference side, in which the change of threat degree was used as the measure index of jamming effectiveness. Then, based on the Q-learning model, an intelligent countermeasure strategy generation (ICSG) model was established, and the main steps in the model were given. Finally, on the basis the JEE model and the ICSG model, the simulation experiment was carried out for CEA operations. The result showed that combining the JEE model with the ICSG model can express the main process of the operations of CEW, as well as proved the validity of these models

    Network-based Metric for Measuring Combat Effectiveness

    Get PDF
    A conceptual definition of combat effectiveness is the overall capability of a force to produce a desiredoutcome from combat against an enemy force. An ability to measure combat effectiveness is critical to strategic andtactical decision making; however, it is a challenging task to develop an operational metric for combat effectivenessdue to the large complexity presented by the rich context of a combat environment. The present paper contendsthat, under a direct fire engagement, combat effectiveness can be reasonably assessed by the prevalence of attack opportunities a given force creates in a combat environment. The paper proposes a method to quantitatively measurecombat effectiveness of a military force in a direct fire engagement environment. The proposed metric is basedon a meta-network representation that captures various aspects of a combat environment. Using a meta-networkrepresentation, two types of basic unit structures of attack opportunity – isolated and networked – are identified,which are then used as a basic element for measuring combat effectiveness. Prevalence of network motifs in anetworked combat environment and availability of attack opportunities are computed as a measure of a militaryforce’s combat effectiveness.Defence Science Journal, 2014, 64(2), pp. 115-122. DOI: http://dx.doi.org/10.14429/dsj.64.553

    EVALUATING ARTIFICIAL INTELLIGENCE METHODS FOR USE IN KILL CHAIN FUNCTIONS

    Get PDF
    Current naval operations require sailors to make time-critical and high-stakes decisions based on uncertain situational knowledge in dynamic operational environments. Recent tragic events have resulted in unnecessary casualties, and they represent the decision complexity involved in naval operations and specifically highlight challenges within the OODA loop (Observe, Orient, Decide, and Assess). Kill chain decisions involving the use of weapon systems are a particularly stressing category within the OODA loop—with unexpected threats that are difficult to identify with certainty, shortened decision reaction times, and lethal consequences. An effective kill chain requires the proper setup and employment of shipboard sensors; the identification and classification of unknown contacts; the analysis of contact intentions based on kinematics and intelligence; an awareness of the environment; and decision analysis and resource selection. This project explored the use of automation and artificial intelligence (AI) to improve naval kill chain decisions. The team studied naval kill chain functions and developed specific evaluation criteria for each function for determining the efficacy of specific AI methods. The team identified and studied AI methods and applied the evaluation criteria to map specific AI methods to specific kill chain functions.Civilian, Department of the NavyCivilian, Department of the NavyCivilian, Department of the NavyCaptain, United States Marine CorpsCivilian, Department of the NavyCivilian, Department of the NavyApproved for public release. Distribution is unlimited

    Coming Full Circle with Boyd\u27s OODA Loop Ideas: An Analysis of Innovation Diffusion and Evolution

    Get PDF
    The Observe-Orient-Decide-Act (OODA) Loop ideas of Air Force Colonel John Boyd have impacted the Department of Defense (DoD), influenced military thought, paved the way for operational change, and helped to shape fighting doctrines. A wide variety of OODA Loop ideas and interpretations exist in the literature, but are unorganized and have not undergone holistic study to determine how Boyd\u27s ideas have spread or changed over time. As such, this research analyzed a quarter century (1976-2003) sample of the OODA Loop literature to examine the diffusion and evolution of OODA Loop ideas since Boyd\u27s original conceptualizations. This research used qualitative data analysis to examine OODA Loop ideas in light of innovation diffusion theory. Ideas from Boyd\u27s original OODA Loop theories were compared and contrasted with subsequent literature instances to assess diffusion and evolution of OODA Loop ideas in the DoD. This research concluded with a proposed conceptual framework for collectively considering OODA Loop ideas

    Functionality, Complexity, and Approaches to Assessment of Resilience Under Constrained Energy and Information

    Get PDF
    While system functions, functionality, and complexity are widely used concepts in systems engineering, there is significant diversity in their definitions and no unified approach to measurement. This research establishes a method for measuring impacts to functionality in dynamic engineered systems based on changes in kinetic energy. This metric is applied at particular levels of abstraction and system scales, consistent with the established multiscale nature of systems. By measuring system behavior in context with expected scenarios, it is possible to estimate expected functionality or set bounds on a system\u27s maximum functionality. Functionality and system effectiveness is heavily influenced by the amount of available energy and the information a system has about its environment. A framework is needed for quickly assessing the impact of changes in information in order to drive system architecture and design. This research relates functionality to the information content required to describe a system using principles from information theory and complexity theory

    Command Agent Belief Architecture to Support Commander Decision Making in Military Simulation

    Get PDF
    In the war, military conflicts have many aspects that are consistent with complexity theory e.g., the higher commander’s decision is directed at animate entity that react under hierarchical and self-organised structure in decentralised command and control for the collectivist dynamism of decomposed elements due to nonlinear complexity of warfare on the battlefield. Agent technology have been found to be suitable for modelling tactical behaviour of entities at multiple level of resolution under hierarchical command and control (C2) structure and provide a powerful abstraction mechanism required for designing simulations of complex and dynamic battlefield situations. Intelligent agents can potentially reduce the overhead on such experiments and studies. Command agents, plan how to carry out the operation and assign tasks to subordinate agents. They receive information from battlefield environment and use such information to build situation awareness and also to respond to unforeseen situations. In the paper, we have proposed a mechanism for modelling tactical behaviour of an intelligent agent by which higher command level entities should be able to synthesize their beliefs derived from the lower level sub ordinates entities. This paper presents a role-based belief, desire and intention mechanism to facilitate in the representation of military hierarchy, modelling of tactical behaviour based on agent current belief, teammate’s belief propagation, and coordination issues. Higher commander can view the battlefield information at different levels of abstraction based on concept of aggregation and disaggregation and take appropriate reactive response to any unforeseen circumstances happening in battlefield

    Cyber-Physical Embedded Systems with Transient Supervisory Command and Control: A Framework for Validating Safety Response in Automated Collision Avoidance Systems

    Get PDF
    The ability to design and engineer complex and dynamical Cyber-Physical Systems (CPS) requires a systematic view that requires a definition of level of automation intent for the system. Since CPS covers a diverse range of systemized implementations of smart and intelligent technologies networked within a system of systems (SoS), the terms “smart” and “intelligent” is frequently used in describing systems that perform complex operations with a reduced need of a human-agent. The difference between this research and most papers in publication on CPS is that most other research focuses on the performance of the CPS rather than on the correctness of its design. However, by using both human and machine agency at different levels of automation, or autonomy, the levels of automation have profound implications and affects to the reliability and safety of the CPS. The human-agent and the machine-agent are in a tidal lock of decision-making using both feedforward and feedback information flows in similar processes, where a transient shift within the level of automation when the CPS is operating can have undesired consequences. As CPS systems become more common, and higher levels of autonomy are embedded within them, the relationship between human-agent and machine-agent also becomes more complex, and the testing methodologies for verification and validation of performance and correctness also become more complex and less clear. A framework then is developed to help the practitioner to understand the difficulties and pitfalls of CPS designs and provides guidance to test engineering design of soft computational systems using combinations of modeling, simulation, and prototyping

    Task Load and Automation Use in an Uncertain Environment

    Get PDF
    The purpose of this research was to investigate the effects that user task load level has on the relationship between an individual\u27s trust in and subsequent use of a system\u27s automation. Automation research has demonstrated a positive correlation between an individual\u27s trust in and subsequent use of the automation. Military decision-makers trust and use information system automation to make many tactical judgments and decisions. In situations of information uncertainty (information warfare environments), decision-makers must remain aware of information reliability issues and temperate their use of system automation if necessary. An individual\u27s task load may have an effect on his use of a system\u27s automation in environments of information uncertainty. It was hypothesized that user task load will have a moderating effect on the positive relationship between system automation trust and use of system automation. Specifically, in situations of information uncertainty (low trust), high task load will have a negative effect on the relationship. To test this hypothesis, an experiment in a simulated command and control micro-world was conducted in which system automation trust and individual task load were manipulated. The findings from the experiment support the positive relationship between automation trust and automation use found in previous research and suggest that task load does have a negative effect on the positive relationship between automation trust and automation use

    Closer Than You Think: The Implications of the Third Offset Strategy for the U.S. Army

    Get PDF
    The Defense Innovation Initiative (DII), begun in November 2014 by former Secretary of Defense Chuck Hagel, is intended to ensure U.S. military superiority throughout the 21st century. The DII seeks broad-based innovation across the spectrum of concepts, research and development, capabilities, leader development, wargaming, and business practices. An essential component of the DII is the Third Offset Strategy—a plan for overcoming (offsetting) adversary parity or advantage, reduced military force structure, and declining technological superiority in an era of great power competition. This study explored the implications for the Army of Third Offset innovations and breakthrough capabilities for the operating environment of 2035-2050. It focused less on debating the merits or feasibility of individual technologies and more on understanding the implications—the second and third order effects on the Army that must be anticipated ahead of the breakthrough.https://press.armywarcollege.edu/monographs/1403/thumbnail.jp
    • …
    corecore